last executing test programs: 1.347941331s ago: executing program 4 (id=5): bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x41, 0x1, 0x200000000000008, 0x9, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff38, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x1}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x36d8}, 0x0, 0xf7ffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r4 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r4, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x400000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r0}, 0x10) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r5, &(0x7f0000001d80)=[{{&(0x7f0000000000)={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000240)='\f', 0x1}], 0x1}}], 0x1, 0x4008055) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x8000000000000000, 0x9}, &(0x7f00000001c0)=0x18) lseek(0xffffffffffffffff, 0x0, 0x1) r6 = syz_open_dev$usbfs(0x0, 0x800000001fe, 0x82) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, 0x0) 1.278811652s ago: executing program 1 (id=2): unshare(0x22020600) r0 = socket$xdp(0x2c, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000000c0), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x8006, 0x0, 0x0, 0xffff9e7b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_usb_disconnect(0xffffffffffffffff) pidfd_send_signal(0xffffffffffffffff, 0x2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x3c1, 0x3, 0x458, 0x0, 0x168, 0x10, 0x190, 0xb, 0x388, 0x250, 0x250, 0x388, 0x250, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_batadv\x00', 'veth1_to_hsr\x00', {}, {}, 0x3a}, 0x6000000, 0x128, 0x190, 0x0, {0x0, 0x28e}, [@common=@icmp6={{0x28}, {0x0, 'K\r'}}, @common=@inet=@hashlimit1={{0x58}, {'netdevsim0\x00', {0x0, 0x0, 0x9, 0x1, 0x0, 0x10000, 0x80000001}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xd0, 0x1f8, 0x0, {}, [@common=@inet=@set2={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:usb_device_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4b8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001300)=@newtfilter={0x118, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r6, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0xec, 0x2, [@TCA_U32_SEL={0x24, 0x5, {0x1, 0x1, 0x3, 0x1, 0x4, 0x102, 0x6, 0x7ffffffa, [{0x200, 0x500, 0x3, 0x6}]}}, @TCA_U32_SEL={0xc4, 0x5, {0x10, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1, 0xfffffffb, 0x100, 0x3ff}, {0x9, 0x7, 0x40, 0x80}, {0x6, 0x7fff, 0x9, 0x7}, {0x3, 0x80, 0x1, 0x6}, {0x1, 0x10, 0x5, 0x5}, {0xac, 0xfffff08a, 0x8, 0x3}, {0x49f, 0x7, 0x81, 0xb}, {0x40, 0x80000001, 0xfffffffe, 0xffffffff}, {0x1, 0x5, 0x5127, 0x800}, {0x6, 0x0, 0x5, 0x1}, {0xaa4, 0x406, 0x2, 0x127c}]}}]}}]}, 0x118}}, 0x24040084) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r4, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="180020000e3734fccdbd5000fdc897050800030002000000"], 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x48011) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x10f042, 0x100) r8 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r8, &(0x7f0000004200)='t', 0x1) sendfile(r8, r7, 0x0, 0x3ffff) 1.069887055s ago: executing program 3 (id=4): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x400000000000000, 0x0, &(0x7f00000000c0)={0x0, 0xa8}}, 0x0) socket$inet(0x2, 0x2, 0x1) sendmsg$key(0xffffffffffffffff, 0x0, 0x40) getrandom(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0xc0802, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000040), 0x12) r6 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="2b70696473205a652b680cc6b31accf414be89dc211de137898e9ae6eb395365cefee98c296da701227eb5aa9b85eb0254ef60f0e3713c7788f61c9a67ce7c37cde15300000000000000003ad9bdc1122e9631dc2353c9711d08b98fe0cac1b5e85f075e104987b99541e9afda36a9a0f2803e0c26949214f61b7a02c4a34cfa7973e30bfb801dc7f05bc4c3000dfb00fa60480ad732faade1fea93191ce909bd932bdca05a10a9a4497d0567976313800"/186], 0x6) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r7 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x2, r7, 0x0, 0x4, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 1.026198746s ago: executing program 4 (id=6): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800}}, {@minixdf}]}, 0x0, 0x502, &(0x7f0000000fc0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x8604}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r2, &(0x7f0000000400), 0x0}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r3}, 0x10) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757818"], 0x65) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="8635bb8c950ecf129eeb303616e1574a9f757406f2fe2a84dd537a258b2bb3791024251e62e43a07932a5333c3f4a9953e9fb92468f59c260fc63f2fd866c809b6d12a4f4fe0e98a2101de4dab424e17fea1e0a950e4249ea364076f486cbd47b24d40eef532d4a284a646ce2761772c8b83ae4da239946b92379df48103a31f1e5a5ae24efdfb5932465af1b3c791d1443c4de9df0940d7931ea1f748572f51152bcf7ce206d11d2ba3c5e0f860bfab037ff3a797cdd86e2b0d2391997489ef9cb349d5daba59a14178ff4fcf9427d4f6f02e57d35be79938b88477a479dbe8"], 0x24}}, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8041, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x7) prctl$PR_SET_NAME(0xf, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000003c0), r0) r7 = socket(0x1, 0x803, 0x0) r8 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r8, 0x17) ioctl$sock_inet_tcp_SIOCOUTQNSD(r8, 0x894b, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x5) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044094}, 0x880) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 915.674797ms ago: executing program 3 (id=7): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f00000001c0)=r0}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002740)='/proc/tty/drivers\x00', 0x0, 0x0) pread64(r3, &(0x7f0000002780)=""/59, 0x3b, 0xf27b) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="b87ea30000000000000072616e733d66642c7266646e6f3d", @ANYRESHEX=r3, @ANYRES32=r3, @ANYRESHEX=r5, @ANYRESOCT=r2, @ANYBLOB='`']) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xa, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="00000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8000000b70300000000000085000000730000009500"/81], &(0x7f0000000200)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="300000003e000701fcfffffffddbdf25047c0000100036800c00020007009300000000000c0001"], 0x30}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) readv(r8, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/154, 0x9a}], 0x1) ioctl$TIOCPKT(r8, 0x5420, &(0x7f0000000100)=0xcf5) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000dc0)={0x0, 0x6, 0x4, 0x1c000000, 0x2, "0062ba7d820740ff00"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000280)=0x13) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='page_pool_state_release\x00', r9, 0x0, 0x8000000000000001}, 0x18) r10 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(r10, &(0x7f0000000440)=[{{&(0x7f00000003c0)={0x2, 0x1, @loopback}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a9050000000074640000000000003552bde5c064", 0x14}], 0x1}}], 0x1, 0x840) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 766.66769ms ago: executing program 2 (id=3): prctl$PR_SET_IO_FLUSHER(0x39, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000200)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0xff, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x12, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @loopback, @loopback}, "e2176371ae9b0999"}}}}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = memfd_create(&(0x7f00000006c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\xf2\xed\x04\x00\x00\x00\xd4N\x12\x9b\x1f\t\xd1Z+\x86T\x16\xf8\x01\x00\x00\x00\x9f+\x8d!\x0fG\xab\xc2\xdc\xa3\xb3\xae8\x9f9?\xefo\xa4k\x01\xb2>\xa1\x9c\x86xm\xe6\x9bZ4\x91\x1a\xdb\xdd\x89\xb9\xc0LF;\xd6\x84\x195\x06\x00\x00\x00~\xf3S\x12\"p^\xc1jP\x8a\xc6[\xbd\xe7q]\xdd\r\x1aZS\x01*\x1b\xfd\xbcMA\xdcq\xa1\x00\xb3\xf9\x91r\x7f\xdc\xf1\xc3G,\xdb\xccS\x15\x95b\x17\xab\xe4?\x96\x95\xa4kP\x99YO\xb8V\xd5p\x90X\xaaf', 0x0) fallocate(r1, 0x0, 0x400000000000000, 0x2) r2 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) preadv(r2, &(0x7f0000000100), 0x2b, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="07000000010100004527ff7f00700a8052", @ANYRES32, @ANYBLOB="0400"/19, @ANYRES32, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00'], 0x50) epoll_create1(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r7, @ANYRES32=r6, @ANYBLOB='&'], 0x10) sendmsg$inet(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000780)='}', 0x1}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f00000002c0)=r3}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) recvmsg$unix(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)=""/229, 0xec1}], 0x1}, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x2, 0x300) 679.948421ms ago: executing program 4 (id=8): socket$inet6_sctp(0xa, 0x5, 0x84) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="1b00"/12], 0x48) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0xfffe, @dev={0xac, 0x14, 0x14, 0x20}}, {0x2, 0x4e23, @rand_addr=0x64010102}, 0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}) r3 = epoll_create1(0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000100)={0xa000000d}) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000400)={0xa}) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0x80000000, 0x0, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000580)) ioctl$PPPIOCSACTIVE(r6, 0x40107446, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x20, 0x15, 0x84, 0x87f3}, {0x6, 0x0, 0x0, 0xfe}]}) write$ppp(r6, &(0x7f0000000300)="4daf", 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="8b3329bd04000000000005"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="20010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x120}, 0x1, 0x0, 0x0, 0x24044004}, 0x4040001) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x7ffc}, 0x18) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25cf, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000, 0x0, 0xfffffffd, 0x1000, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffa, 0x7fffffff, 0x9, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x9, 0xfffffefb, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x40000000, 0x100000, 0x1000, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x800d4, 0xc, 0x5, 0x0, 0x0, 0x0, 0x3032, 0x0, 0x1, 0x0, 0x6, 0x8, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, 0x0, 0x8, 0x0, 0x4, 0x20000000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, 0x2, 0x3ff, 0xfffffffc, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x9, 0x0, 0x0, 0x40000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, 0x6, 0x48cc45e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2bc9, 0x4, 0x80000, 0x4]}, @TCA_TBF_PARMS={0x28, 0x1, {{}, {0x2, 0x0, 0x5, 0x0, 0x0, 0x40}}}]}}]}, 0x45c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 678.732621ms ago: executing program 0 (id=1): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) mlockall(0x7) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000017c0)=@newtaction={0xe6c, 0x30, 0x25, 0x1000, 0x0, {}, [{0xe58, 0x1, [@m_pedit={0xe54, 0x1, 0x0, 0x0, {{0xa}, {0xe28, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{0xff}, 0x2}, [{}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {}, {0x1ff, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x80000, 0x200}, {}, {}, {}, {}, {}, {0x10000}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x800000, 0x9}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x800}, {}, {0x0, 0x0, 0x0, 0x7ff}, {0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x12}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {0x0, 0xffffff18}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {0x0, 0x3ff}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x80000000}, {}, {0x0, 0x0, 0x1}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x6}, {0x0, 0x2e}, {0x1, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0xffffffff}, {}, {0xffffffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x8000000}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xfffffff4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x4000000}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x80000000}], [{}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe6c}}, 0x40000) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) openat$cgroup_pressure(r7, &(0x7f0000000280)='memory.pressure\x00', 0x2, 0x0) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x240007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f00000002c0)='vegas\x00', 0x6) sendto$inet(r8, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x11, 0x0, 0x27) ioctl$sock_inet_SIOCSARP(r8, 0x8955, &(0x7f0000000180)={{0x2, 0x4e20, @loopback}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x18, {0x2, 0x4e24, @rand_addr=0x64010101}, 'wg0\x00'}) sendmsg$nl_xfrm(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000640)=@migrate={0x54, 0x21, 0x1, 0x0, 0x0, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@migrate={0x4}]}, 0x54}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r1}, 0x18) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000540)={'sit0\x00', 0x0, 0x80, 0x7, 0x6, 0x20000006, {{0x24, 0x4, 0x1, 0x5, 0x90, 0x68, 0x0, 0x1, 0x29, 0x0, @multicast2, @multicast1, {[@timestamp={0x44, 0x14, 0x25, 0x0, 0xd, [0xffff7fff, 0x10ca3, 0x4, 0x0]}, @rr={0x7, 0x0, 0x26, [@local, @empty]}]}}}}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 656.354991ms ago: executing program 2 (id=9): sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xf5, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ac0000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8800000000000000000000000000010c00028005000100000000000800074000000000180006801400040020010000000000000000000000000001"], 0xac}, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x54, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x10000, 0x10001, 0xd1, 0x1, 0x8, 0xfffffffd, 0xb, 0x0, 0x0, 0x0, 0x2000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x21, 0x1000, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) close(r0) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="5c00000013006bcc9e3be35c6e17aa31086b876c1d0000007ea60864160af36511002b000c000300160000000003bc24eab556a705251e6182fffffffff60a84c9f4d4938037e786a6d0001000000e4509c5bb5b64f6985300000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r3 = dup(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) newfstatat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0, 0x800) 470.222444ms ago: executing program 0 (id=10): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x1000}, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000340)=0x8000, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000400)={'batadv_slave_0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000100)={0x2c, 0x0, r5}, 0x10) bind$xdp(r2, &(0x7f0000000200)={0x2c, 0xd, r5, 0x2}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3ff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='rpcgss_unwrap_failed\x00', r6, 0x0, 0x1}, 0xfffffffffffffc86) socket$netlink(0x10, 0x3, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r7, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000340)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33cb95d66a1781f31bf07fd2ae874", "62266bd8", "d1b29b99d21d88a2"}, 0x28) write$binfmt_script(r7, &(0x7f0000000780)={'#! ', './file0'}, 0xb) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x4}]}) msgget$private(0x0, 0x0) close_range(r8, 0xffffffffffffffff, 0x0) 400.239155ms ago: executing program 2 (id=11): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='((^}^+&)\x00') r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2, 0x0, 0x7}, 0x18) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x55, 0x1aa}, 0x4, 0xfffe, 0x0, 0x1, 0x7, 0x20005, 0xb1dd, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r4, &(0x7f0000000100)={&(0x7f0000000200)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000007c0)=[@fadd={0x58, 0x114, 0x6, {{0x3, 0x407}, &(0x7f0000000180)=0x9, 0x0, 0x800029, 0x5, 0x6, 0x968, 0x20, 0xfffffffffffffff9}}], 0x58, 0x4804}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000400)={0x0, 0xfffffff0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000760009eeffffffffffffff0400000000", @ANYRES32=0x0, @ANYBLOB="04000d80080005"], 0x24}, 0x1, 0x5502000000000000}, 0x0) mount$9p_unix(&(0x7f0000002600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)='.\x00', 0x0, 0x1b03088, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010006797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30008000000900030073797a32000000001400000011ff811dfcb1d00001ebfd0f7259b12c0863020b1a66e5b07c65bb2460ef696c153577f9bc4886c0f5db41e580d736ae0577c55d64365b415d1c291cf9f159136eeaabd4a28c810baabdf27dd1d462d1e5b34c7ac2c31638940cbb6938b85647ec695cfc0a33c73954565acd825b3ec1422f840000"], 0x7c}}, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r3, 0x8008f513, &(0x7f00000001c0)) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x200, {0x0, 0x0, 0x0, r9, {0xfff2, 0xb}, {}, {0xfffd}}}, 0x24}}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1500000000"], 0x0}, 0x90) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)={{0x14}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @limit={{0xa}, @val={0x4}}}]}]}], {0x14}}, 0x6c}, 0x1, 0x0, 0x0, 0x20000091}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) 136.764039ms ago: executing program 1 (id=12): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\t\x00\x00\x00\f\x00\x00\x00B\x00\x00\x00@\x00\x00\x00\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000000e6c2cab1b8fa576c5fa8e57e832b31d41130000000000000000", @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x1008014, &(0x7f0000000000)=ANY=[], 0x3, 0x7bf, &(0x7f0000000d80)="$eJzs3U1sHPXZAPBnHDsEI0UR76sURSFMApWCFMx6DaYWB1jWY2dgvWvtrqtEVUUj4iArDiAoaskFokrQVq2qnnqkXLn11qpSK/XQ9lSpHHrpDYlTRaV+iQpVcjWzu47t+It8OND8fivvf3bmmfk/Mx7Ps7PenQ0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIJL6dKUynkQjby6cSbdWn2635raZPljer9c16zy9rt+IpPiJAwfik3/0xv3/1cmHi7sTcbT36GgcKJoDcfmew4ee/L/hocH82yR0vY7vMi6JeKtI6uK55eXFV29BInvo+7/8zLP8e6W4n82aeSfyudpsluadVjo1OVl59PRMJ53JG1nnbKebzaX1dlbrttrpyfrD6fjU1ESajZ1tLTRnp2uNbDDyiUeqlcpk+uzYfFZrd1rNR5+NTv103mjkzdkyplr5VhQxTxQ74nN5N+1mtbk0vbC0vDixU6pF0PhmE/b19p+jDx366PUP/760WOyQWy0k6e+Y1fHxanV88vGpx5+oVIarler6EZUNYjUihiKKiFuy0/IFcnMP4HADhvr1PxqRRzMW4kykm9xGoh7T0Y5WzBWP/zRyTUTfoP5/+dG//mG7ftfW/0GVv+/q5CNR1v9jvUfHtqr/m+a6l7fX4o24HBfjXCzHcizGq7c9ox1uQze6hGTdo9nIohl5dKIVecxFrRyT9sekMRWTMRmVeD5Ox0x0Io2ZyKMRWXTibHSiG1m5R9WjHVnUohutaEcaJ6MeD0ca4zEVUzERaWQxFmejFQvRjNmYjlq5lAuxVG73iQ1ZHr47fvHiHz96txheDRrfbrWKJ3NF0N+2Cbqm3G9b/1dWiucLGyPU/zvA/u0m3oKjOFyflUH9BwAAAP5nJeWr78X5/0jcXw7N5I3sa7c7LQAAAOAmKv/zf7RoRoqh+yMpzv8rm0R+sOe5AQAAADdHUn7GLomI0XigN3QhluKtWIzNXgSIiEN7nSIAAABwg8r//x8rmtGIN8sRg8ulbHH+DwAAAHzRfHera+x/OLjGbmf+ruRXIxExklyZP/NQcqlWxNUu7evN12++urrE7syR5GB/IWUzOXz5niQihuvZ0WRw9cv/3NVrPy7vjwyvzr7Vtf6TdnvbBGL7BMpH8YM43os5fr5s7unPMpz0ehmdyRvZWL3VeLK8JGLx0339paVvRxS9f685dzCJC0vLi2MvvLx8vszlSjH7lUv9Cyhecx3FbXJZ6W+BuH/zNR4pP4jR73e0129l7foP9WYf2r7PZG2fb8eJXsyJ0V47OpjS6/NA0ef42JPjUasdHOpmZ7qvr6xZ+34W46trPnJda/52PNiLefDkg71mkyyq67J46dosqmu3/+62xa6zePf4m2f+9dtWkk3slMXEZ8hiZV/ExiwAbpcL5VV/rlahu8sq9OlKT1H/e3W3KFa1XkDfLo61/7zay+qzjMH8a2rdcGys7kOrB8bdVfeV6B3RT/ZiTvaeTwwf2aSuVDY5or+y9Mrv+kf0x97/yU+/fuz3Pyv7va7q9n483IvpN3Hvb7aoscU6/3BDVX2vmOO9LfvtNKpJXInY981Lr8Th1964/MjSpXMvLr64+FK1OjFZeaxSeby6vx87Uj5j2CZTAO5cO3/HzpYRgzqTPLbhrDrOr6+7966+pWAsXoiXYznOx6ny0wYR8cDm/Y6ueRvCqR3OWkfXfMPLqR3OLa/GVq+NTWKL2Ik1W+xLPy6bT27JrwMA9sSJHerwNvV/9ZX5Uzucd6+v5RvOjmPrWr6Zr9zSrQEAd4as/XEy2n0nabfz+efHp6bGa93TWdpu1Z9L2/n0bJbmzW7Wrp+uNWezdL7d6rbqgxeOp7NO2lmYn2+1u+lMq53GUCc/U37ze9r/6vdONldrdvN6Z76R1TpZWm81u7V6N53OO/V0fuGZRt45nbXLmTvzWT2fyeu1bt5qpp3WQruejaVpJ8vWBObTWbObz+TFYDOdb+dztfaViGgszGXpdNapt/P5bqu3wEFfeXOm1Z4rFzt27er/Za+3NwB8Hrz2xuWL55aXF1+9voE/7yb4dq8jALCeKg0AAAAAAAAAAAAAAJ9/q+//PzQYKMbewCcCP9vAXXHLu7hjB4pf5Ocgjds78I2nnrq4Vcwzb953enfLid1+UjbeORix/+c/6o15euvg7/T//m7Omn4QEdcx+0qyyaRPV3oD6w4T+/f+yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA1/pvAAAA//9Inly9") r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="0f00ee9b02d58b64a74b6a0000000097acfccdcf3be6340000"], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x76}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000280)='kfree\x00', r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYRES16=r2], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d6163"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) syz_clone3(&(0x7f00000006c0)={0x102102180, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0x0], 0x1}, 0x58) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000880)='mlxsw_sp_acl_atcam_entry_add_ctcam_spill\x00'}, 0x18) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x348, 0x18c, 0x203, 0x348, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x16}, {}, {}, {}, {}, {}, {0x0, 0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x7}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffff8acc}]}}, @common=@hl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000cbffffff00000000000000008500000041000000850000005000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) r7 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC(r7, 0x0, 0x5, &(0x7f0000000240)={@local, @dev={0xac, 0x14, 0x14, 0x3f}, 0x1, "66c5aff8a7eb3af1f6cec2e7420000008c84aea31700", 0x23, 0x1000000, 0x7e, 0x6b}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x2000000000000019, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0xffffffbc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r9}, 0x10) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd6002000800fe2c00fe8000000000000000000000000000bbff02000000000000000000000000000132"], 0x0) 0s ago: executing program 1 (id=13): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f00000006c0), 0x1, 0x513, &(0x7f0000000c40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = inotify_init() prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x18) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xff7fffff7ffffffd]}, 0x0, 0x8) inotify_add_watch(r1, &(0x7f0000000000)='./file1\x00', 0x7a8) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c460d04000c028000000000000003003e00ecffffff940200000000000040000000000000004d020000000000000000000000003800010001017f000800030000006400000005000000000000000a000000000000000101000000000000a1"], 0x78) close(r0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0xff, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) pipe(0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x121602, 0x0) ioctl$TIOCVHANGUP(r6, 0x5437, 0x2) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r8}, 0x10) r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r9, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): =process permissive=1 [ 27.221610][ T29] audit: type=1400 audit(1752118663.539:61): avc: denied { siginh } for pid=3285 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.46' (ED25519) to the list of known hosts. [ 35.643929][ T29] audit: type=1400 audit(1752118672.049:62): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 35.645159][ T3296] cgroup: Unknown subsys name 'net' [ 35.666684][ T29] audit: type=1400 audit(1752118672.049:63): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 35.694208][ T29] audit: type=1400 audit(1752118672.089:64): avc: denied { unmount } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 35.830994][ T3296] cgroup: Unknown subsys name 'cpuset' [ 35.837238][ T3296] cgroup: Unknown subsys name 'rlimit' [ 35.999062][ T29] audit: type=1400 audit(1752118672.399:65): avc: denied { setattr } for pid=3296 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 36.022703][ T29] audit: type=1400 audit(1752118672.399:66): avc: denied { create } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.043930][ T29] audit: type=1400 audit(1752118672.399:67): avc: denied { write } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.054043][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 36.064730][ T29] audit: type=1400 audit(1752118672.399:68): avc: denied { read } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 36.094746][ T29] audit: type=1400 audit(1752118672.399:69): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.121861][ T29] audit: type=1400 audit(1752118672.399:70): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.148237][ T3296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 36.152143][ T29] audit: type=1400 audit(1752118672.489:71): avc: denied { relabelto } for pid=3299 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 37.710289][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 37.818498][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.825848][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.833390][ T3308] bridge_slave_0: entered allmulticast mode [ 37.839984][ T3308] bridge_slave_0: entered promiscuous mode [ 37.851447][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 37.873101][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.880326][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.887625][ T3308] bridge_slave_1: entered allmulticast mode [ 37.894153][ T3308] bridge_slave_1: entered promiscuous mode [ 37.927891][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.943079][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 37.952647][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.979450][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 38.002567][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 38.017260][ T3308] team0: Port device team_slave_0 added [ 38.041481][ T3308] team0: Port device team_slave_1 added [ 38.047241][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.054371][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.061682][ T3313] bridge_slave_0: entered allmulticast mode [ 38.068206][ T3313] bridge_slave_0: entered promiscuous mode [ 38.091668][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.098832][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.106240][ T3313] bridge_slave_1: entered allmulticast mode [ 38.112730][ T3313] bridge_slave_1: entered promiscuous mode [ 38.143162][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.150381][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.157631][ T3306] bridge_slave_0: entered allmulticast mode [ 38.164243][ T3306] bridge_slave_0: entered promiscuous mode [ 38.171080][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.179877][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.187163][ T3306] bridge_slave_1: entered allmulticast mode [ 38.193763][ T3306] bridge_slave_1: entered promiscuous mode [ 38.204924][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.212209][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.238375][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.265200][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.272301][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.298579][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.310608][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.339843][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.355340][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.391811][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.401926][ T3313] team0: Port device team_slave_0 added [ 38.412947][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.420043][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.427396][ T3317] bridge_slave_0: entered allmulticast mode [ 38.434036][ T3317] bridge_slave_0: entered promiscuous mode [ 38.440677][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.447803][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.455113][ T3316] bridge_slave_0: entered allmulticast mode [ 38.461751][ T3316] bridge_slave_0: entered promiscuous mode [ 38.470154][ T3308] hsr_slave_0: entered promiscuous mode [ 38.476495][ T3308] hsr_slave_1: entered promiscuous mode [ 38.483361][ T3313] team0: Port device team_slave_1 added [ 38.500282][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.507534][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.515182][ T3317] bridge_slave_1: entered allmulticast mode [ 38.521666][ T3317] bridge_slave_1: entered promiscuous mode [ 38.527898][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.535039][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.542768][ T3316] bridge_slave_1: entered allmulticast mode [ 38.549330][ T3316] bridge_slave_1: entered promiscuous mode [ 38.567639][ T3306] team0: Port device team_slave_0 added [ 38.588514][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.595545][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.622038][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.633843][ T3306] team0: Port device team_slave_1 added [ 38.645568][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.660144][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.667250][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.693395][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.709992][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.725860][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.750477][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.760345][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.767941][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.794268][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.807674][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.814718][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.841876][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.859644][ T3316] team0: Port device team_slave_0 added [ 38.886950][ T3316] team0: Port device team_slave_1 added [ 38.902191][ T3317] team0: Port device team_slave_0 added [ 38.909713][ T3317] team0: Port device team_slave_1 added [ 38.923153][ T3313] hsr_slave_0: entered promiscuous mode [ 38.929270][ T3313] hsr_slave_1: entered promiscuous mode [ 38.935601][ T3313] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.943342][ T3313] Cannot create hsr debugfs directory [ 38.957844][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.964975][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.991349][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.014955][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.022581][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.052803][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.069999][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.077072][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.105770][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.129768][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.137329][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.164070][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.208264][ T3316] hsr_slave_0: entered promiscuous mode [ 39.214692][ T3316] hsr_slave_1: entered promiscuous mode [ 39.221896][ T3316] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 39.229857][ T3316] Cannot create hsr debugfs directory [ 39.238332][ T3306] hsr_slave_0: entered promiscuous mode [ 39.248130][ T3306] hsr_slave_1: entered promiscuous mode [ 39.255668][ T3306] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 39.263390][ T3306] Cannot create hsr debugfs directory [ 39.321734][ T3317] hsr_slave_0: entered promiscuous mode [ 39.328545][ T3317] hsr_slave_1: entered promiscuous mode [ 39.335131][ T3317] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 39.342834][ T3317] Cannot create hsr debugfs directory [ 39.461610][ T3308] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 39.487783][ T3308] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 39.516088][ T3308] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 39.528276][ T3308] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 39.559500][ T3313] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 39.569885][ T3313] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 39.581254][ T3313] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 39.593807][ T3313] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 39.637960][ T3317] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 39.649103][ T3317] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 39.661869][ T3317] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 39.675161][ T3317] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 39.718752][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.728431][ T3316] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 39.749904][ T3316] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 39.759194][ T3316] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 39.774749][ T3316] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 39.796427][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.814289][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.821769][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.834373][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.843752][ T3306] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 39.854137][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.861354][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.876160][ T3306] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 39.886326][ T3306] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 39.896281][ T3306] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 39.938744][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.955663][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.962796][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.971540][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.978699][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.999756][ T3308] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 40.010270][ T3308] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.037716][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.051179][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.079085][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.102327][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.125140][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.132258][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.143228][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.150694][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.173595][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.206561][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.215367][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.229423][ T172] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.236597][ T172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.248367][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.261839][ T172] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.270124][ T172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.294146][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.321090][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.328294][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.353442][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.360859][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.405362][ T3306] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 40.415880][ T3306] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.433663][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.486607][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.501762][ T3313] veth0_vlan: entered promiscuous mode [ 40.538372][ T3313] veth1_vlan: entered promiscuous mode [ 40.567308][ T3308] veth0_vlan: entered promiscuous mode [ 40.591530][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.606055][ T3308] veth1_vlan: entered promiscuous mode [ 40.618094][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.627972][ T3313] veth0_macvtap: entered promiscuous mode [ 40.649374][ T3317] veth0_vlan: entered promiscuous mode [ 40.656362][ T3313] veth1_macvtap: entered promiscuous mode [ 40.676099][ T3308] veth0_macvtap: entered promiscuous mode [ 40.685730][ T3308] veth1_macvtap: entered promiscuous mode [ 40.698092][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.707594][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.723137][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.734119][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.743351][ T3317] veth1_vlan: entered promiscuous mode [ 40.751745][ T3308] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.760683][ T3308] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.769408][ T3308] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.778267][ T3308] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.796759][ T3313] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.805805][ T3313] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.814981][ T3313] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.824007][ T3313] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.843436][ T3317] veth0_macvtap: entered promiscuous mode [ 40.859246][ T3317] veth1_macvtap: entered promiscuous mode [ 40.876781][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 40.876798][ T29] audit: type=1400 audit(1752118677.279:81): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/root/syzkaller.c6hBUG/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 40.911247][ T29] audit: type=1400 audit(1752118677.279:82): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 40.934949][ T29] audit: type=1400 audit(1752118677.279:83): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/root/syzkaller.c6hBUG/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 40.960313][ T29] audit: type=1400 audit(1752118677.279:84): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 40.982208][ T29] audit: type=1400 audit(1752118677.279:85): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/root/syzkaller.c6hBUG/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 41.011940][ T29] audit: type=1400 audit(1752118677.279:86): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/root/syzkaller.c6hBUG/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3790 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 41.042414][ T29] audit: type=1400 audit(1752118677.289:87): avc: denied { unmount } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 41.067721][ T29] audit: type=1400 audit(1752118677.319:88): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.093714][ T29] audit: type=1400 audit(1752118677.319:89): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="gadgetfs" ino=3794 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 41.120514][ T3308] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 41.140796][ T29] audit: type=1400 audit(1752118677.549:90): avc: denied { read write } for pid=3308 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 41.148528][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.178257][ T3316] veth0_vlan: entered promiscuous mode [ 41.192581][ T3316] veth1_vlan: entered promiscuous mode [ 41.202109][ C1] hrtimer: interrupt took 26842 ns [ 41.229878][ T3306] veth0_vlan: entered promiscuous mode [ 41.241503][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.251676][ T3306] veth1_vlan: entered promiscuous mode [ 41.271807][ T3317] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.281088][ T3317] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.289888][ T3317] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.298718][ T3317] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.337180][ T3316] veth0_macvtap: entered promiscuous mode [ 41.347514][ T3316] veth1_macvtap: entered promiscuous mode [ 41.362776][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.372126][ T3306] veth0_macvtap: entered promiscuous mode [ 41.379750][ T3306] veth1_macvtap: entered promiscuous mode [ 41.395607][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.421170][ T3316] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.430993][ T3316] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.440411][ T3316] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.449404][ T3316] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.474523][ T3486] loop4: detected capacity change from 0 to 512 [ 41.479240][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.503622][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.536166][ T3306] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.543625][ T3480] xt_CT: No such helper "pptp" [ 41.545321][ T3306] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.559045][ T3306] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.567981][ T3306] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.585773][ T3486] EXT4-fs error (device loop4): __ext4_iget:5379: inode #4: block 193290: comm syz.4.6: invalid block [ 41.595411][ T3480] loop1: detected capacity change from 0 to 1024 [ 41.617575][ T3480] ======================================================= [ 41.617575][ T3480] WARNING: The mand mount option has been deprecated and [ 41.617575][ T3480] and is ignored by this kernel. Remove the mand [ 41.617575][ T3480] option from the mount to silence this warning. [ 41.617575][ T3480] ======================================================= [ 41.657467][ T3480] EXT4-fs: Ignoring removed nobh option [ 41.663223][ T3480] EXT4-fs: Ignoring removed bh option [ 41.665968][ T3486] EXT4-fs error (device loop4): ext4_quota_enable:7127: comm syz.4.6: Bad quota inode: 4, type: 1 [ 41.682920][ T3486] EXT4-fs warning (device loop4): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 41.699252][ T3486] EXT4-fs (loop4): mount failed [ 41.726172][ T3480] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.750088][ T3486] SELinux: ebitmap: map size 149 does not match my size 64 (high bit was 0) [ 41.768828][ T3500] netlink: 'syz.3.7': attribute type 1 has an invalid length. [ 41.782976][ T3486] SELinux: failed to load policy [ 41.882940][ T3507] netlink: 40 bytes leftover after parsing attributes in process `syz.2.9'. [ 41.898234][ T3507] netlink: 'syz.2.9': attribute type 3 has an invalid length. [ 41.905936][ T3507] netlink: 1 bytes leftover after parsing attributes in process `syz.2.9'. [ 42.057938][ T3513] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 42.120710][ T3513] bridge_slave_0: left allmulticast mode [ 42.126499][ T3513] bridge_slave_0: left promiscuous mode [ 42.132430][ T3513] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.143887][ T3513] bridge_slave_1: left allmulticast mode [ 42.149872][ T3513] bridge_slave_1: left promiscuous mode [ 42.155717][ T3513] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.168434][ T3513] bond0: (slave bond_slave_0): Releasing backup interface [ 42.177720][ T3517] atomic_op ffff888119432928 conn xmit_atomic 0000000000000000 [ 42.186368][ T3513] bond0: (slave bond_slave_1): Releasing backup interface [ 42.199883][ T3513] team0: Port device team_slave_0 removed [ 42.212341][ T3513] team0: Port device team_slave_1 removed [ 42.219881][ T3513] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 42.228281][ T3513] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 42.238171][ T3513] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 42.245725][ T3513] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 42.257431][ T3521] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11'. [ 42.326814][ T3480] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.368072][ T3528] loop1: detected capacity change from 0 to 764 [ 42.375762][ T3513] syz.0.10 (3513) used greatest stack depth: 10600 bytes left [ 42.453891][ T3521] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.465777][ T3521] bridge_slave_1 (unregistering): left allmulticast mode [ 42.473251][ T3521] bridge_slave_1 (unregistering): left promiscuous mode [ 42.480514][ T3521] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.491246][ T3505] ================================================================== [ 42.499407][ T3505] BUG: KCSAN: data-race in __ep_eventpoll_poll / wakeup_source_report_event [ 42.508240][ T3505] [ 42.510690][ T3505] write to 0xffff88811a5aee38 of 1 bytes by interrupt on cpu 0: [ 42.518884][ T3505] wakeup_source_report_event+0xd6/0x280 [ 42.524728][ T3505] __pm_stay_awake+0x34/0x70 [ 42.529373][ T3505] ep_poll_callback+0x1f6/0x550 [ 42.534281][ T3505] __wake_up+0x66/0xb0 [ 42.538646][ T3505] ep_poll_callback+0x3d6/0x550 [ 42.544049][ T3505] __wake_up+0x66/0xb0 [ 42.548188][ T3505] bpf_ringbuf_notify+0x22/0x30 [ 42.553096][ T3505] irq_work_run+0xe2/0x2d0 [ 42.557547][ T3505] __sysvec_irq_work+0x22/0x170 [ 42.562422][ T3505] sysvec_irq_work+0x66/0x80 [ 42.567066][ T3505] asm_sysvec_irq_work+0x1a/0x20 [ 42.572054][ T3505] native_apic_msr_write+0x3d/0x60 [ 42.577307][ T3505] x2apic_send_IPI_self+0x10/0x20 [ 42.582375][ T3505] arch_irq_work_raise+0x46/0x50 [ 42.587587][ T3505] __irq_work_queue_local+0x10f/0x2c0 [ 42.593018][ T3505] irq_work_queue+0x70/0x100 [ 42.597648][ T3505] bpf_ringbuf_discard+0xd3/0xf0 [ 42.602667][ T3505] bpf_prog_fe0ed97373b08409+0x4b/0x4f [ 42.608459][ T3505] bpf_trace_run3+0x10f/0x1d0 [ 42.613271][ T3505] kmem_cache_free+0x257/0x300 [ 42.618854][ T3505] skb_free_head+0x87/0x150 [ 42.623485][ T3505] skb_release_data+0x33b/0x370 [ 42.628381][ T3505] __kfree_skb+0x44/0x150 [ 42.632827][ T3505] sk_skb_reason_drop+0xbd/0x270 [ 42.637887][ T3505] skb_queue_purge_reason+0x1fb/0x250 [ 42.643294][ T3505] packet_release+0x6fc/0x810 [ 42.647997][ T3505] sock_close+0x68/0x150 [ 42.652258][ T3505] __fput+0x298/0x650 [ 42.656261][ T3505] ____fput+0x1c/0x30 [ 42.660268][ T3505] task_work_run+0x131/0x1a0 [ 42.664898][ T3505] exit_to_user_mode_loop+0xe4/0x100 [ 42.670648][ T3505] do_syscall_64+0x1d6/0x200 [ 42.675267][ T3505] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.681183][ T3505] [ 42.683528][ T3505] read to 0xffff88811a5aee38 of 1 bytes by task 3505 on cpu 1: [ 42.691288][ T3505] __ep_eventpoll_poll+0x1de/0x4e0 [ 42.696442][ T3505] ep_eventpoll_poll+0x1f/0x30 [ 42.701381][ T3505] do_select+0x8ee/0xf50 [ 42.705666][ T3505] core_sys_select+0x3d7/0x6e0 [ 42.710470][ T3505] __se_sys_pselect6+0x216/0x280 [ 42.715787][ T3505] __x64_sys_pselect6+0x78/0x90 [ 42.720684][ T3505] x64_sys_call+0x1caa/0x2fb0 [ 42.725388][ T3505] do_syscall_64+0xd2/0x200 [ 42.729925][ T3505] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.735945][ T3505] [ 42.738458][ T3505] value changed: 0x00 -> 0x01 [ 42.743275][ T3505] [ 42.745615][ T3505] Reported by Kernel Concurrency Sanitizer on: [ 42.751796][ T3505] CPU: 1 UID: 0 PID: 3505 Comm: syz.4.8 Not tainted 6.16.0-rc5-syzkaller-00053-g8c2e52ebbe88 #0 PREEMPT(voluntary) [ 42.763994][ T3505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 42.774087][ T3505] ================================================================== [ 42.856876][ T3531] loop1: detected capacity change from 0 to 512 [ 42.869512][ T3531] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 42.908997][ T3531] EXT4-fs (loop1): 1 orphan inode deleted [ 42.919257][ T3531] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.933611][ T31] EXT4-fs error (device loop1): ext4_release_dquot:6969: comm kworker/u8:1: Failed to release dquot type 1 [ 42.953952][ T3531] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 42.975312][ T3531] EXT4-fs error (device loop1): ext4_lookup:1787: inode #15: comm syz.1.13: iget: bad i_size value: 360287970189639690 [ 42.998006][ T3531] EXT4-fs error (device loop1): ext4_lookup:1787: inode #15: comm syz.1.13: iget: bad i_size value: 360287970189639690 [ 43.044698][ T3531] EXT4-fs error (device loop1): ext4_lookup:1787: inode #15: comm syz.1.13: iget: bad i_size value: 360287970189639690 [ 43.106430][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.